Author of the publication

Formal Security Analysis with Interacting State Machines.

, and . ESORICS, volume 2502 of Lecture Notes in Computer Science, page 212-228. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Formal Security Model for Microprocessor Hardware., , and . IEEE Trans. Software Eng., 26 (8): 702-712 (2000)Towards a Trustworthy Service Marketplace for the Future Internet., , , , , and . Future Internet Assembly, volume 7281 of Lecture Notes in Computer Science, page 105-116. Springer, (2012)Formal Security Analysis with Interacting State Machines., and . ESORICS, volume 2502 of Lecture Notes in Computer Science, page 212-228. Springer, (2002)Accountability for cloud and other future Internet services., , , , , , , , , and 3 other author(s). CloudCom, page 629-632. IEEE Computer Society, (2012)DOA-Trusted Cloud 2013 PC Co-Chairs Message., , and . OTM Conferences, volume 8185 of Lecture Notes in Computer Science, page 308. Springer, (2013)Control as a Means towards Accountable Services in the Cloud., , and . Comput. Syst. Sci. Eng., (2013)Towards Security Certification Schemas for the Internet of Services., , , and . NTMS, page 1-5. IEEE, (2012)Towards Validating Security Protocol Deployment in the Wild., , and . COMPSAC (2), page 434-438. IEEE Computer Society, (2009)978-0-7695-3726-9.Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152)., , , and . Dagstuhl Reports, 8 (4): 20-31 (2018)A Formal Security Model for Microprocessor Hardware., , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 718-737. Springer, (1999)